concern is that malicious actors will be able to access the data without engaging in active reconnaissance.
Which of the following is the MOST efficient approach to perform the analysis?
A. Provide a domain parameter to theHarvester tool.
B. Check public DNS entries using dnsenum.
C. Perform a Nessus vulnerability scan targeting a public company's IP.
D. Execute nmap using the options: scan all ports and sneaky mode.